15.10 - Session Constraint Values for Permanent Database Users - Teradata Database

Teradata Database SQL Data Definition Language Syntax and Examples

prodname
Teradata Database
vrm_release
15.10
created_date
December 2015
category
Programming Reference
featnum
B035-1144-151K

When a permanent database user accesses a row protected by a security constraint, the system determines the session constraint value(s) as follows:

  1. If the user profile has a corresponding security constraint assignment, the session uses the constraint value(s) specified in the profile definition.
  2. If the user profile does not have a security constraint specification, the system derives the session constraint value(s) from the user definition.
  3. Whether user constraint values are defined in a profile or user definition, if multiple constraint values are defined, the system determines the session value(s) as follows:
    • For hierarchical (non-set) constraints, the system uses the DEFAULT value specified in the profile, or if there is no profile, in the user definition. If no DEFAULT is specified, the system uses first value listed for the constraint.
    • For non-hierarchical (set) constraints, the session uses all constraint values in the profile, or if there is no profile, in the user definition. No DEFAULT can be specified.
      Requesting users can use SET SESSION CONSTRAINT to change the session constraint value to any constraint value specified in the profile or user definition.
  4. If neither the user profile nor the user definition contains a security constraint assignment, the constraint value for the session is NULL, and the user can access rows controlled by a security constraint only if assigned the necessary OVERRIDE privileges.
  5. If a user has OVERRIDE privileges on the object and the operation being performed, the system ignores constraints assigned in the profile or user definition. The session derives security constraint values in one of the following ways:
    • For simple inserts, the user must supply the constraint value(s).
    • For compound statements, for example, INSERT-SELECT or MERGE, the system derives constraint value(s) from the security constraint columns in the source table.
    • The user can use SET SESSION CONSTRAINT to specify constraint values.